SlideShare a Scribd company logo
Trust and Identity In Virtual Worlds and Collaborative Spaces Anthony Nadalin, Distinguished Engineer, IBM
Early Virtual Worlds & Collaborative Spaces Business Applications Commerce Collaboration and Events Education  and Training Emerging  Business  Applications
Trust and identity in Virtual worlds and collaborative spaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some examples of issues around trust and identity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collaborative spaces and virtual communities * MMOG = Massive Multiplayer Online Game   Multi-service Platforms Social Computing 3D/Realtime Internet/MMOGs Common problem: Trust and Identity Enterprise Customers & Governments
What is new, compared to 10 years ago? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario 1: Trusted Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario 2: Trusted Collaboration [email_address] [email_address] Request freetime ,[object Object],[object Object],[object Object],[object Object],Patrick Paul
Scenario 3: Trusted Roaming I want to see what World of Warcraft is about ,[object Object],[object Object],[object Object],I do have an avatar in Second Life
Scenario 4: Trusted Delegation Give Alice the right to see Bob’s images ,[object Object],[object Object]
Scenario 5: Trusted Aggregation Bank Health Insur. Employer Aggregator
Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],Specific Scenario 1. Trusted Content Trust in correctness and appropriateness of specific / of all objects in a collaborative space (e.g., Wikipedia, Second Life). 2. Trusted Collaboration Enable freetime-based scheduling of meetings across calendars in different enterprises, using different identity schemes. 3. Trusted Roaming Cross bridges from one virtual world to the other, carrying your identity (avatar, attributes, reputation) with you 4. Trusted Delegation Give your friend access to your digital photos without the fear that the photo server knows who your friends are, or that your friends share your photos with others. 5. Trusted Aggregation Aggregate personal information through a portal, without fear of misuse or fear of identity theft, but with the added value of non-trivial aggregation.
State of the Art
Some Remarks on Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior?  Digital Identity
Outlook
3. Future of  Virtual Reality 4. Future of Identity Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2 . Future of Identity ,[object Object],[object Object],[object Object],[object Object],1. Future of Identification ,[object Object],[object Object],[object Object],Technology Outlook BBC 2007 On average: 20 20% growth/year    IBM GIO 2006
An   eComm 2008   presentation –   http://eCommMedia.com   for more

More Related Content

What's hot

Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
Tommy Hobin
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
Shawn Tuma
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
gallowayandcollens
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
BeenVerified Berkman Submission
BeenVerified Berkman SubmissionBeenVerified Berkman Submission
BeenVerified Berkman Submissioncanarickd
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
PrimumMarketing
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Kaliya "Identity Woman" Young
 
Web 3.0 and What It Means to Marketing
Web 3.0 and What It Means to MarketingWeb 3.0 and What It Means to Marketing
Web 3.0 and What It Means to Marketing
Magic Logix
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
Kaliya "Identity Woman" Young
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Kirsten Thompson
 
Noah Lang's Presentation
Noah Lang's PresentationNoah Lang's Presentation
Noah Lang's PresentationMediabistro
 
Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2AmieBodkin
 
NII Social Engineering Case Study
NII Social Engineering Case StudyNII Social Engineering Case Study
NII Social Engineering Case Study
Network Intelligence India
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
Kaliya "Identity Woman" Young
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
Somerco Research
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
 
Token or no token-2,000 word arti cle
Token or no token-2,000 word arti cleToken or no token-2,000 word arti cle
Token or no token-2,000 word arti cleHector Hoyos
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
Sumbal Noureen
 

What's hot (20)

Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
BeenVerified Berkman Submission
BeenVerified Berkman SubmissionBeenVerified Berkman Submission
BeenVerified Berkman Submission
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Web 3.0 and What It Means to Marketing
Web 3.0 and What It Means to MarketingWeb 3.0 and What It Means to Marketing
Web 3.0 and What It Means to Marketing
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Noah Lang's Presentation
Noah Lang's PresentationNoah Lang's Presentation
Noah Lang's Presentation
 
Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2
 
Web 3 0
Web 3 0 Web 3 0
Web 3 0
 
NII Social Engineering Case Study
NII Social Engineering Case StudyNII Social Engineering Case Study
NII Social Engineering Case Study
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Token or no token-2,000 word arti cle
Token or no token-2,000 word arti cleToken or no token-2,000 word arti cle
Token or no token-2,000 word arti cle
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
 

Viewers also liked

10 rosemary benefits
10 rosemary benefits10 rosemary benefits
10 rosemary benefitsovitruk
 
Social media for the pragmatic student
Social media for the pragmatic studentSocial media for the pragmatic student
Social media for the pragmatic student
Linda Jacobson
 
The Social Life of Second Life: An analysis of the networks of a virtual world
The Social Life of Second Life: An analysis of the networks of a virtual worldThe Social Life of Second Life: An analysis of the networks of a virtual world
The Social Life of Second Life: An analysis of the networks of a virtual world
Aleks Krotoski
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
Trust Odia
 
Global Virtual Teams Teigland
Global Virtual Teams TeiglandGlobal Virtual Teams Teigland
Global Virtual Teams Teigland
Robin Teigland
 
Social networking learnings & opportunities web innovation conference, bangal...
Social networking learnings & opportunities web innovation conference, bangal...Social networking learnings & opportunities web innovation conference, bangal...
Social networking learnings & opportunities web innovation conference, bangal...
Rohit Varma
 
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Health Informatics New Zealand
 
Trusting The Trust
Trusting The TrustTrusting The Trust
Trusting The Trust
budi rahardjo
 
virtual team
virtual teamvirtual team
virtual team
Amrinder Kaur
 
Building trust in virtual teams -Change Management Institute
Building trust in virtual teams -Change Management InstituteBuilding trust in virtual teams -Change Management Institute
Building trust in virtual teams -Change Management Institute
Korrine Jones
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Ahmed Raza
 
Building trust in virtual teams March 2014
Building trust in virtual teams March 2014Building trust in virtual teams March 2014
Building trust in virtual teams March 2014
Korrine Jones
 
Strangers as constructive trustee
Strangers as constructive trustee Strangers as constructive trustee
Strangers as constructive trustee Hafizul Mukhlis
 
The speed of trust
The speed of trustThe speed of trust
The speed of trust
Yves Hanoulle
 
Dynamics Of Trust
Dynamics Of  TrustDynamics Of  Trust
Dynamics Of Trust
NonVerbals Consulting
 
How To Build Trust In A Relationship – Interpersonal Skills
How To Build Trust In A Relationship – Interpersonal SkillsHow To Build Trust In A Relationship – Interpersonal Skills
How To Build Trust In A Relationship – Interpersonal Skills
VKool Magazine - VKool.com
 
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORKBUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
JIANGUANGLUNG DANGMEI
 

Viewers also liked (18)

10 rosemary benefits
10 rosemary benefits10 rosemary benefits
10 rosemary benefits
 
Social media for the pragmatic student
Social media for the pragmatic studentSocial media for the pragmatic student
Social media for the pragmatic student
 
The Social Life of Second Life: An analysis of the networks of a virtual world
The Social Life of Second Life: An analysis of the networks of a virtual worldThe Social Life of Second Life: An analysis of the networks of a virtual world
The Social Life of Second Life: An analysis of the networks of a virtual world
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
 
Global Virtual Teams Teigland
Global Virtual Teams TeiglandGlobal Virtual Teams Teigland
Global Virtual Teams Teigland
 
Social networking learnings & opportunities web innovation conference, bangal...
Social networking learnings & opportunities web innovation conference, bangal...Social networking learnings & opportunities web innovation conference, bangal...
Social networking learnings & opportunities web innovation conference, bangal...
 
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
 
Trusting The Trust
Trusting The TrustTrusting The Trust
Trusting The Trust
 
virtual team
virtual teamvirtual team
virtual team
 
Building trust in virtual teams -Change Management Institute
Building trust in virtual teams -Change Management InstituteBuilding trust in virtual teams -Change Management Institute
Building trust in virtual teams -Change Management Institute
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity
 
Building trust in virtual teams March 2014
Building trust in virtual teams March 2014Building trust in virtual teams March 2014
Building trust in virtual teams March 2014
 
Strangers as constructive trustee
Strangers as constructive trustee Strangers as constructive trustee
Strangers as constructive trustee
 
The speed of trust
The speed of trustThe speed of trust
The speed of trust
 
Dynamics Of Trust
Dynamics Of  TrustDynamics Of  Trust
Dynamics Of Trust
 
The Speed Of Trust
The Speed Of TrustThe Speed Of Trust
The Speed Of Trust
 
How To Build Trust In A Relationship – Interpersonal Skills
How To Build Trust In A Relationship – Interpersonal SkillsHow To Build Trust In A Relationship – Interpersonal Skills
How To Build Trust In A Relationship – Interpersonal Skills
 
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORKBUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
 

Similar to Tony Nadalin' presentation at eComm 2008

Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
Kaliya "Identity Woman" Young
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust online
Tina Guenther
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
bernardgolden
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
Evernym
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
Kannan Subbiah
 
The Open, Social Web Workshop
The Open, Social Web WorkshopThe Open, Social Web Workshop
The Open, Social Web Workshop
Chris Messina
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
Inês Almeida
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
Doug Cornelius
 
Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008
Kaliya "Identity Woman" Young
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docx
stirlingvwriters
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
IRJET Journal
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application Developers
WSO2
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
Robert Stribley
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
Darrell O'Donnell
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 

Similar to Tony Nadalin' presentation at eComm 2008 (20)

Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust online
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
Openid
OpenidOpenid
Openid
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
The Open, Social Web Workshop
The Open, Social Web WorkshopThe Open, Social Web Workshop
The Open, Social Web Workshop
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
 
Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docx
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application Developers
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 

More from eComm2008

David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008eComm2008
 
Dave Troy's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008Dave Troy's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008eComm2008
 
eComm 2008 Programme Guide
eComm 2008 Programme GuideeComm 2008 Programme Guide
eComm 2008 Programme Guide
eComm2008
 
Anders Carlius's presentation at eComm 2008
Anders Carlius's presentation at eComm 2008Anders Carlius's presentation at eComm 2008
Anders Carlius's presentation at eComm 2008eComm2008
 
Sean O\'Sullivan\'s presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008Sean O\'Sullivan\'s presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008eComm2008
 
Norman Lewis\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008Norman Lewis\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008eComm2008
 
Sheldon Renan's presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008Sheldon Renan's presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008eComm2008
 
Brough Turner\'s presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008Brough Turner\'s presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008eComm2008
 
Brian Capouch's presentation at eComm 2008
Brian Capouch's presentation at eComm 2008Brian Capouch's presentation at eComm 2008
Brian Capouch's presentation at eComm 2008eComm2008
 
Fabrizio Capobianco's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008Fabrizio Capobianco's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008eComm2008
 
Shirish Andhare's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008Shirish Andhare's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008eComm2008
 
Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008eComm2008
 
Trevor Baca's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008Trevor Baca's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008eComm2008
 
Jan Macek's presentation at eComm 2008
Jan Macek's presentation at eComm 2008Jan Macek's presentation at eComm 2008
Jan Macek's presentation at eComm 2008eComm2008
 
Martin Geddes's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008Martin Geddes's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008eComm2008
 
Michel Bauwens's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008Michel Bauwens's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008eComm2008
 
Nathan Eagle's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008Nathan Eagle's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008eComm2008
 
Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008eComm2008
 
Rocky Nevin's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008Rocky Nevin's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008eComm2008
 
Phil Wolff's 's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008Phil Wolff's 's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008eComm2008
 

More from eComm2008 (20)

David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008
 
Dave Troy's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008Dave Troy's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008
 
eComm 2008 Programme Guide
eComm 2008 Programme GuideeComm 2008 Programme Guide
eComm 2008 Programme Guide
 
Anders Carlius's presentation at eComm 2008
Anders Carlius's presentation at eComm 2008Anders Carlius's presentation at eComm 2008
Anders Carlius's presentation at eComm 2008
 
Sean O\'Sullivan\'s presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008Sean O\'Sullivan\'s presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008
 
Norman Lewis\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008Norman Lewis\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008
 
Sheldon Renan's presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008Sheldon Renan's presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008
 
Brough Turner\'s presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008Brough Turner\'s presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008
 
Brian Capouch's presentation at eComm 2008
Brian Capouch's presentation at eComm 2008Brian Capouch's presentation at eComm 2008
Brian Capouch's presentation at eComm 2008
 
Fabrizio Capobianco's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008Fabrizio Capobianco's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008
 
Shirish Andhare's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008Shirish Andhare's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008
 
Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008
 
Trevor Baca's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008Trevor Baca's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008
 
Jan Macek's presentation at eComm 2008
Jan Macek's presentation at eComm 2008Jan Macek's presentation at eComm 2008
Jan Macek's presentation at eComm 2008
 
Martin Geddes's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008Martin Geddes's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008
 
Michel Bauwens's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008Michel Bauwens's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008
 
Nathan Eagle's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008Nathan Eagle's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008
 
Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008
 
Rocky Nevin's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008Rocky Nevin's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008
 
Phil Wolff's 's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008Phil Wolff's 's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Tony Nadalin' presentation at eComm 2008

  • 1. Trust and Identity In Virtual Worlds and Collaborative Spaces Anthony Nadalin, Distinguished Engineer, IBM
  • 2. Early Virtual Worlds & Collaborative Spaces Business Applications Commerce Collaboration and Events Education and Training Emerging Business Applications
  • 3.
  • 4.
  • 5. Collaborative spaces and virtual communities * MMOG = Massive Multiplayer Online Game   Multi-service Platforms Social Computing 3D/Realtime Internet/MMOGs Common problem: Trust and Identity Enterprise Customers & Governments
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Scenario 5: Trusted Aggregation Bank Health Insur. Employer Aggregator
  • 13.
  • 15.
  • 16.
  • 17. Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior?  Digital Identity
  • 19.
  • 20. An eComm 2008 presentation – http://eCommMedia.com for more